Skip to main content

CVE-2025-54174: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.CMS

Medium
VulnerabilityCVE-2025-54174cvecve-2025-54174cwe-352
Published: Wed Aug 20 2025 (08/20/2025, 12:53:09 UTC)
Source: CVE Database V5
Vendor/Project: OpenSolution
Product: Quick.CMS

Description

QuickCMS is vulnerable to Cross-Site Request Forgery in article creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious article with content defined by the attacker. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 08/20/2025, 13:18:31 UTC

Technical Analysis

CVE-2025-54174 is a Cross-Site Request Forgery (CSRF) vulnerability identified in OpenSolution's Quick.CMS version 6.8. The vulnerability specifically affects the article creation functionality within the CMS. An attacker can exploit this flaw by crafting a malicious website that, when visited by an authenticated administrator, automatically sends a forged POST request to the Quick.CMS server. This request results in the creation of an article containing attacker-controlled content without the administrator's consent or knowledge. The vulnerability arises because the application does not implement adequate CSRF protections such as anti-CSRF tokens or proper validation of the origin of requests. The vendor was notified early but has not provided detailed information about the vulnerability or the full range of affected versions beyond version 6.8, which was confirmed vulnerable through testing. No patches or fixes have been publicly released, and there are no known exploits currently in the wild. The CVSS v4.0 base score is 5.1 (medium severity), reflecting that the attack can be performed remotely without authentication but requires user interaction (the admin visiting the malicious site). The vulnerability impacts the integrity of the CMS content by allowing unauthorized content injection, which could be used for defacement, misinformation, or embedding malicious links. The scope is limited to the Quick.CMS installation and the privileges of the compromised admin account. There is no impact on confidentiality or availability directly, and no privilege escalation or authentication bypass is involved.

Potential Impact

For European organizations using Quick.CMS version 6.8, this vulnerability poses a moderate risk. An attacker could manipulate website content by injecting malicious or misleading articles, potentially damaging the organization's reputation and trustworthiness. This is particularly critical for public-facing websites of government agencies, educational institutions, or businesses that rely on Quick.CMS for content management. The integrity compromise could also facilitate phishing or malware distribution if attackers embed harmful links or scripts within the injected articles. Since the attack requires an administrator to visit a malicious site, the risk is somewhat mitigated by user awareness but remains significant in environments with less stringent security training or where administrators frequently browse the internet. The lack of vendor response and patches increases the risk of exploitation over time. Additionally, the absence of known exploits in the wild suggests this vulnerability is not yet actively exploited, but it remains a potential target for attackers aiming to compromise CMS content integrity.

Mitigation Recommendations

Organizations should implement several specific measures beyond generic advice: 1) Immediately restrict administrative access to Quick.CMS to trusted networks or VPNs to reduce exposure to malicious sites. 2) Educate administrators about the risks of visiting untrusted websites while logged into the CMS to prevent inadvertent CSRF attacks. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests to the article creation endpoint. 4) If possible, implement manual CSRF protections by adding anti-CSRF tokens or validating the HTTP Referer header in the CMS codebase, even if vendor patches are unavailable. 5) Monitor CMS logs for unusual article creation activity or unexpected content changes. 6) Consider isolating the CMS admin interface on a separate subdomain with strict Content Security Policy (CSP) and SameSite cookie attributes to reduce CSRF risk. 7) Plan for an upgrade or migration to a CMS version or alternative product that addresses this vulnerability once vendor patches become available or consider applying community patches if trustworthy. 8) Regularly back up website content to enable quick restoration if malicious content is injected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-07-17T14:14:05.030Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a5c777ad5a09ad0004e15e

Added to database: 8/20/2025, 1:02:47 PM

Last enriched: 8/20/2025, 1:18:31 PM

Last updated: 8/21/2025, 12:35:14 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats